Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.os.linux.security > #178

Re: Security breach?

Newsgroups comp.os.linux.security
Subject Re: Security breach?
From Ohmster <root@dev.nul>
References <XnsA145508078CBMyBigKitty@216.196.97.131> <slrnkevaie.4qm.BitTwister@wb.home.test> <i1OHs.32904$3S5.11697@newsfe18.iad> <XnsA1452A741B196MyBigKitty@216.196.97.131> <slrnkevu1b.sfk.BitTwister@wb.home.test>
Organization Ohm's Fish Market
Message-ID <XnsA145ABD95DD64MyBigKitty@216.196.97.131> (permalink)
Date 2013-01-11 15:53 -0600

Show all headers | View raw


Bit Twister <BitTwister@mouse-potato.com> wrote in
news:slrnkevu1b.sfk.BitTwister@wb.home.test: 

> On Fri, 11 Jan 2013 03:10:37 -0600, Ohmster wrote:
> 
> Going to merge in stuff from upline posts.
> 
> Before I forget it again, you need to create a police report to help
> cover your @$$.

No financial loss. Contacted ebay seller of silver coins, cancelled the 
transaction, no items shipped. The seller was good about it, they also 
have had their PC rooted and they sell a LOT of silver and coins.
 
>> ...sigh. I noticed a few days ago that the Firefox browser was open
>> to craigslist and it was a post to my acount for a ridiculous suv for
>> sale with all kinds of spam words in it, so many it would violate
>> CL's TOS. 
> 
> So your telling us you have been cracked for a few days.  :-(
 
Well yeah, although I did not know it for sure until now. I woke up a few 
days ago, found my Linux machine on, Firefox opened to craigslist, and an 
ad for an suv posted that was chock full of spam words was posted. Made 
no sense so I did nothing. Next day got an email from craigslist telling 
me "my ad" violated TOS and would be cancelled.

>> Selinux is too restrictive, by the time I figure it out I would be
>> dead so I disabled it all this time.
> 
> If you had selinux disabled then you helped the cracker to get into
> the box. 

Well, with selinux enabled, *nothing* works anymore. Not samba, ssh may 
have issues, httpd, ftpd, everything is broken and is a major hassle to 
get working again, if it is possible at all. Now I am sure that the 
people who wrote selinux did not mean to disable the entire daemon system 
and there must be some, clear documentation on how to make it work, but I 
cannot find it. No GUI or easy to understand docs that I can find. 
Pointers?

>> Gotta be a rootkit or something.
> 
> And there lies the rub. There is no telling what is installed unless 
> you take the drive to another system and really dig into it.
> This assumes you know what you are doing and do not infect the new
> system. 

I would have to wipe and reinstall this system and I do not want to 
reinfect it. However, I have many config files that I will need, not to 
mention the public_html directory is something I use all the time.

>> Bit Twister <BitTwister@mouse-potato.com> wrote in
>> news:slrnkevaie.4qm.BitTwister@wb.home.test: 
>>
>> Yeah well that did not seem to help, still in my box, having a field
>> day with the brower and stored passwords.
> 
> Yep, I never store passwords in the browser.
> Hell, I have a separate Linux account for surfing, credit card,
> bank,... Except for bank, .bash_logout wipes and tars in a pristine
> setup. 

Good tip. So much for that idea. Since I hardly ever use the Linux 
desktop on a 2Ghz Pentium w/1,5 Gb DDR RAM because it is very slow, it 
makes no sense to store passwords on it. Not to mention compiz, which I 
think is quite cool, but overall, performance, even with an nvidia card, 
leaves much to be desired.

> I even have separate Linux accounts for each email account.
> Can not use the tar/wipe/restore there.

I have enabled mail in previous installs of Fedora, the whole thing was 
no good, my IP was blocked every step of the way for being a cable IP 
block. So much for mail server. I did use my ISP, Comcast as the mail 
agent, but this too was a disastor. They just do not want individuals 
running mail servers and I do understand why. Spam boxes were built and 
sold for this very reason and are totally banned.

>>> Going to guess no firewall and/or lack/missing security updates of
>>> plugins and/or applications used via the web.
>>
>> Not at all. I have the firewall running and use the updater applet
>> all the time. And I use yum to update the system constantly.
> 
> That means you have whatever updates supplied by your distro.
> Not necessarily the latest.

Of course. I run MintOS to be able to use the rpm files that my package 
manager will understand, install, and keep track of. I cannot just "jet 
off to kernel.org" and install the latest bleeding edge kernel from a 
tarball and maintain system stability. But MintOS updates are quite 
frequent, the come several times a month.

>>> Had you been running something like
>>> http://sourceforge.net/projects/aide
>>> and running something like http://rkhunter.sourceforge.net
>>> 
>>> You might have had a chance, maybe.
>>
>> No. Never heard of it until now. You think it can help, even after
>> the fact? Oh this looks awesome, Bit!
> 
> Aide would be useless at this point.
> rkhunter might work but you have to connect to
> get a download of the database so doing that on the infected system
> is just asking for trouble.

I read up a little on rkhunter and it seems to take the tripwire 
approach, meaning I would initially need a clean system to install it on, 
not much good once system is infected.

> Moving the drive to another system an running rkhunter might turn
> something up but I would not count on it.

I do not think it would help, but it would be a very wise thing to do 
after installing clean.

[..]
>> Wow! Really? Logwatch did show tampered or altered system files but I
>> fail to see how this one file can do anything bad.
> 
> You are missing the point. Malware puts hooks in to catch anything 
> relating to its activity and put it in the bit bucket.
> 
> In your case not everything is being caught.

Sad.

>> Hm, never thought of that. Must I use another Linux box or can I use
>> my Windows 7 machine that I can ssh to?
> 
> Oh, My God. Hell, you might have be cracked through that machine if it
> is on the same network.

Yes it is on the same LAN but I doubt it was cracked through the Windows 
7 machine which is up to date with Avast installed and updated. This 
machine never connects to Linux but for samba when I want and ssh w/PuTTY 
when I need it. The MintOS machine itself is online, 24/7, with FQDN and 
httpd, ftpd, sshd, and everything else. It is a wide open target all by 
itself.

>> Yes it is offline and shut down. I want to power it up but must pull
>> the Ethernet cable until I can disable the Internet on this box.
>> Sysconfig, NETWORKING - NO?
>> What do you think?
> 
> You have to pull the network cable unless you want to purchase
> something else on craigslist or ebay.  :-(
> 
> Hope you got the delivery address for what was bought. It looks real
> good in the police report.

You think the machine will power itself back on, all by itself or by 
remote command when it is not even turned on? I would sure like to see 
that! But I will pull the cable if you think it prudent. I do want to be 
able to power it up and recsue my files though, and I would like to be 
able to do it with LAN access, if at all possible. How to do it? Pull 
cablemodem plug and run on LAN only while getting files or can I block 
just the Linux machine from Internet while running it?

Ebay silver coin purchase was cancelled by me this afternoon. I called 
the seller in Montana and spoke to her about it. She sells a LOT of 
silver so she herself has been rooted and understands what happens. She 
was gracious and sent me a cancellation form. Nothing purchased on 
craigslist. A police report with nothing stolen other than peace of mind 
would not go over well with BSO in my county. :P

>> Tell me more BT. Thanks! 
> 
> If the choice is between win7 and the infected box and you want to
> root around, then all I can suggest is get a new drive, unplug
> infected drive(s), clean install, + updates, + aide, + rkhunter, tell
> fstab about infected drive(s) set to not automount with read only.
> 
> Power down, connected infected drive and start looking through the
> drive. 

Oh my, that would be rough.

> Other solution is to use a live cd but that is going to be a bit slow.
> If someone comes after you with legal paper, you better have
> unmodified drive(s) showing you were cracked and have a copy of your
> police report. 

Yes, I thought about a live CD, there are several good ones out there, 
but as you say, it would be slow.

> I would be very surprised if you find/figure out how you were cracked.
> Saw an article about some malware on an infected web site would create
> a tunnel back to cracker.  :(

Last time I got rooted or hacked, it was in the apache logs, some script 
kiddy used a buffer overflow exploit and got in. Since Redhat 9 was EOL 
for 2 years, I guess I had it coming.

> Any internet content, flash, pdf, gif, MP3, WMA, WMV, MP2,..., might
> contain malware.

...really. Oh this really bits. Any way to scan files for malware in 
Linux?

> Poisoned cookies, bookmarks, dns cache,... are another vector.
> Not to mention infected websites cracking your router from the LAN
> side. 
> 
> If it were me, I would put the drive(s) in the closet and hope nothing
> else happens.

Made your point. The system is trashed. I don't have exta money for a new 
hard drive right now, but formatting this one should totally rid it of 
malware and with a clean install, be okay. I must copy important files to 
a separate hard drive and have two of them in the Linux machine. Then I 
can mount them and access my stuff when I need it.

Thanks Bit. Man, you have been at the help desk like, forever dude! When 
do you get your gold watch? I will pitch in if everyone else will. :)

-- 
~Ohmster

Back to comp.os.linux.security | Previous | NextPrevious in thread | Next in thread | Find similar


Thread

Security breach? Ohmster <root@dev.nul> - 2013-01-10 23:29 -0600
  Re: Security breach? Bit Twister <BitTwister@mouse-potato.com> - 2013-01-11 05:59 +0000
    Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-11 06:10 +0000
      Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 02:45 -0600
        Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-11 20:44 +0000
          Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 15:06 -0600
            Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-11 22:26 +0000
          Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 16:45 -0600
            Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-12 00:24 +0000
              Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 19:34 -0600
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-12 02:16 +0000
                Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 21:04 -0600
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-12 05:44 +0000
                Re: Security breach? Ohmster <root@dev.nul> - 2013-01-12 16:29 -0600
                Re: Security breach? Bit Twister <BitTwister@mouse-potato.com> - 2013-01-13 03:01 +0000
                Re: Security breach? GangGreene <GangGreene@example.com> - 2013-01-13 07:24 -0500
                Re: Security breach? Bit Twister <BitTwister@mouse-potato.com> - 2013-01-13 14:51 +0000
                Re: Security breach? GangGreene <GangGreene@example.com> - 2013-01-13 10:45 -0500
                Re: Security breach? Jim Beard <jdbeard@patriot.net> - 2013-01-13 12:21 -0500
                Re: Security breach? GangGreene <GangGreene@example.com> - 2013-01-13 12:59 -0500
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-13 20:40 +0000
                Re: Security breach? GangGreene <GangGreene@example.com> - 2013-01-13 16:14 -0500
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-13 23:51 +0000
                Re: Security breach? GangGreene <GangGreene@example.com> - 2013-01-14 09:59 -0500
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-14 17:39 +0000
                Re: Security breach? GangGreene <GangGreene@example.com> - 2013-01-14 16:16 -0500
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-14 21:48 +0000
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-13 20:35 +0000
          Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 17:05 -0600
            Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-12 00:26 +0000
      Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 03:10 -0600
        Re: Security breach? Bit Twister <BitTwister@mouse-potato.com> - 2013-01-11 11:31 +0000
          Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 15:53 -0600
            Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-11 23:05 +0100
              Re: Security breach? Richard Kettlewell <rjk@greenend.org.uk> - 2013-01-11 22:14 +0000
                Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 16:47 -0600
                Re: Security breach? Bit Twister <BitTwister@mouse-potato.com> - 2013-01-12 00:26 +0000
                Re: Security breach? Richard Kettlewell <rjk@greenend.org.uk> - 2013-01-12 09:23 +0000
                Re: Security breach? Ohmster <root@dev.nul> - 2013-01-12 16:31 -0600
                Re: Security breach? Ohmster <root@dev.nul> - 2013-01-12 16:36 -0600
                Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-13 14:45 +0100
              Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 16:39 -0600
            Re: Security breach? Bit Twister <BitTwister@mouse-potato.com> - 2013-01-12 00:08 +0000
        Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-11 20:50 +0000
          Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 15:19 -0600
            Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-11 22:30 +0000
              Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 16:49 -0600
    Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 02:36 -0600
    Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 02:52 -0600
  Re: Security breach? "David W. Hodgins" <dwhodgins@nomail.afraid.org> - 2013-01-11 03:10 -0500
    Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 02:39 -0600
  Re: Security breach? Richard Kettlewell <rjk@greenend.org.uk> - 2013-01-11 10:53 +0000
    Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 15:12 -0600
      Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-11 22:53 +0100
        Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 15:57 -0600
          Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-11 23:29 +0100
            Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 16:55 -0600
              Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-11 23:59 +0100
                Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 17:07 -0600
                Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-12 00:24 +0100
                Re: Security breach? `blindshell' ...INFECTED (PORTS: 465) Ohmster <root@dev.nul> - 2013-01-11 17:48 -0600
                Re: Security breach? `blindshell' ...INFECTED (PORTS: 465) Ohmster <root@dev.nul> - 2013-01-11 18:07 -0600
            Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-12 00:16 +0000
              Re: Security breach? Aragorn <stryder@telenet.be.invalid> - 2013-01-12 12:13 +0100
                Re: Security breach? unruh <unruh@invalid.ca> - 2013-01-12 18:30 +0000
      Re: Security breach? Richard Kettlewell <rjk@greenend.org.uk> - 2013-01-11 22:07 +0000
        Re: Security breach? Ohmster <root@dev.nul> - 2013-01-11 17:22 -0600

csiph-web